Which IDPS technique uses a database that contains known attack patterns?

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.

Which IDPS technique uses a database that contains known attack patterns?
A . Role-based
B . Profile-based
C . Signature-based
D . Anomaly-based

Answer: C

Latest DEA-1TT4 Dumps Valid Version with 116 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments